New provable data transfer from provable data possession and deletion for secure cloud storage

With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of out...

Full description

Bibliographic Details
Main Authors: Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang
Format: Article
Language:English
Published: SAGE Publishing 2019-04-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719842493
id doaj-5dc2d89f1aeb4acaa88dfcd474aa2955
record_format Article
spelling doaj-5dc2d89f1aeb4acaa88dfcd474aa29552020-11-25T03:08:35ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-04-011510.1177/1550147719842493New provable data transfer from provable data possession and deletion for secure cloud storageYudong LiuShuai XiaoHan WangXu An WangWith the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of outsourced data needs to be periodically checked by users to protect their data. Also, the secure transfer of cloud data can avoid data losses to users. Aiming at solving these problems in the data outsourcing process, a provable data transfer scheme based on provable data possession and deletion is recently proposed by Xue et al. However, we found a security flaw in Xue et al.’s scheme. Concretely, the block tags can be forged in their scheme. In this article, we first give a brief review of Xue et al.’s scheme and then a detailed attack is shown. To remove the security flaw, an improved scheme is proposed. Furthermore, we replace the integrity checking protocol of their proposal with a more efficient protocol to improve the efficiency of data integrity auditing.https://doi.org/10.1177/1550147719842493
collection DOAJ
language English
format Article
sources DOAJ
author Yudong Liu
Shuai Xiao
Han Wang
Xu An Wang
spellingShingle Yudong Liu
Shuai Xiao
Han Wang
Xu An Wang
New provable data transfer from provable data possession and deletion for secure cloud storage
International Journal of Distributed Sensor Networks
author_facet Yudong Liu
Shuai Xiao
Han Wang
Xu An Wang
author_sort Yudong Liu
title New provable data transfer from provable data possession and deletion for secure cloud storage
title_short New provable data transfer from provable data possession and deletion for secure cloud storage
title_full New provable data transfer from provable data possession and deletion for secure cloud storage
title_fullStr New provable data transfer from provable data possession and deletion for secure cloud storage
title_full_unstemmed New provable data transfer from provable data possession and deletion for secure cloud storage
title_sort new provable data transfer from provable data possession and deletion for secure cloud storage
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2019-04-01
description With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of outsourced data needs to be periodically checked by users to protect their data. Also, the secure transfer of cloud data can avoid data losses to users. Aiming at solving these problems in the data outsourcing process, a provable data transfer scheme based on provable data possession and deletion is recently proposed by Xue et al. However, we found a security flaw in Xue et al.’s scheme. Concretely, the block tags can be forged in their scheme. In this article, we first give a brief review of Xue et al.’s scheme and then a detailed attack is shown. To remove the security flaw, an improved scheme is proposed. Furthermore, we replace the integrity checking protocol of their proposal with a more efficient protocol to improve the efficiency of data integrity auditing.
url https://doi.org/10.1177/1550147719842493
work_keys_str_mv AT yudongliu newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage
AT shuaixiao newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage
AT hanwang newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage
AT xuanwang newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage
_version_ 1724665629313597440